Misbinding Raw Public Keys to Identities in TLS

Mariam Moustafa*, Mohit Sethi, Tuomas Aura

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Abstract

The adoption of security protocols such as Transport Layer Security (TLS) has significantly improved the state of traffic encryption and integrity protection on the Internet. Despite rigorous analysis, vulnerabilities continue to emerge, sometimes due to fundamental flaws in the protocol specification. This paper examines the security of TLS when using Raw Public Key (RPK) authentication. This mode has not been as extensively studied as X.509 certificates and Pre-Shared Keys (PSK). We develop a formal model of TLS RPK using applied pi calculus and the ProVerif verification tool, revealing that the RPK mode is susceptible to identity misbinding attacks. Our contributions include formal models of TLS RPK with several mechanisms for binding the endpoint identity to its public key, verification results, practical scenarios demonstrating the misbinding attack, and recommendations for mitigating such vulnerabilities. These findings highlight the need for improved security measures in TLS RPK.

Original languageEnglish
Title of host publicationSecure IT Systems - 29th Nordic Conference, NordSec 2024, Proceedings
EditorsLeonardo Horn Iwaya, Liina Kamm, Leonardo Martucci, Tobias Pulls
PublisherSpringer
Pages62-79
Number of pages18
ISBN (Electronic)978-3-031-79007-2
ISBN (Print)978-3-031-79006-5
DOIs
Publication statusPublished - 28 Jan 2025
MoE publication typeA4 Conference publication
EventNordic Conference on Secure IT Systems - Karlstad, Sweden
Duration: 6 Nov 20247 Nov 2024
Conference number: 29

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
PublisherSpringer
Volume15396 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceNordic Conference on Secure IT Systems
Abbreviated titleNordSec
Country/TerritorySweden
CityKarlstad
Period06/11/202407/11/2024

Keywords

  • formal modeling
  • identity misbinding
  • raw public key
  • TLS

Fingerprint

Dive into the research topics of 'Misbinding Raw Public Keys to Identities in TLS'. Together they form a unique fingerprint.

Cite this